Chapter 10: Digital Security

12345678910111213
Across
  1. 2. program that hides within or looks like a legitimate program.
  2. 5. program or set of instructions in a program that allow users to bypass security controls.
  3. 7. _______ software was originally developed to detect and remove computer viruses.
  4. 9. refers to a group of compromised computers or mobile devices connected to a network.
  5. 10. ______ provides encryption of all data that passes between client and internet server.
  6. 11. _______ is a notice that guarantees a user or website is legitimate.
  7. 12. can be used to protect computers and equipment from electrical power disturbances.
  8. 13. actions to be taken to restore full information processing operations.
Down
  1. 1. _______ is a surge protector that provides power during power loss.
  2. 3. refers to significant increase in electrical power.
  3. 4. an authorized company that issues and verifies digital certificates.
  4. 6. online or internet based illegal act.
  5. 8. ____ copies itself repeatedly, using up resources and possibly shutting down computer/network.